EHR and Cyber Security
COMMENTARY William A. Hyman Professor Emeritus, Biomedical Engineering Texas A&M University, w-hyman@tamu.edu Read other articles by this author The FDA has issued a draft guidance…
Read MoreCOMMENTARY William A. Hyman Professor Emeritus, Biomedical Engineering Texas A&M University, w-hyman@tamu.edu Read other articles by this author The FDA has issued a draft guidance…
Read MoreWilliam Hersh, MD, Professor and Chair, OHSU Blog: Informatics Professor One of the computer applications that has received the most attention in healthcare is Watson, the IBM system…
In the Age of Digital Medicine, Big Data is Big News and Big Business Yesterday, Tom Sullivan, Editor at Government HealthIT, and reporting from his…
400,000 reasons to check your network security. Mike Semel Semel Consulting Want to avoid a HIPAA penalty? Do you know… what a firewall is? the…
Robert Rowley, MD Twitter: @RRowleyMD For clinicians participating in the federal EHR Incentive Program (Meaningful Use), Stage 2 of Meaningful Use (MU2) is right around the corner…
COMMENTARY William A. Hyman Professor Emeritus, Biomedical Engineering Texas A&M University, w-hyman@tamu.edu Read other articles by this author A persistent theme in EHR adoption is…
By Mike Semel Understand What Constitutes HIPAA Compliant E-mail Every day I get questions about HIPAA compliant e-mail, and many days I see or hear…
William Hersh, MD, Professor and Chair, OHSU Blog: Informatics Professor A recent blog posting calls for a “universal EMR” for the entire healthcare system. The author provides an example…
William Hersh, MD, Professor and Chair, OHSU Blog: Informatics Professor For the last nine months, I have had the opportunity to be part of a workgroup of…